메뉴 건너뛰기




Volumn 5103 LNCS, Issue PART 3, 2008, Pages 584-593

Agent-based immunological intrusion detection system for mobile Ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; COMPUTER CRIME; FINANCIAL DATA PROCESSING; MOBILE TELECOMMUNICATION SYSTEMS; ROUTING PROTOCOLS; SECURITY OF DATA; SENSORS; SIGNAL DETECTION; TELECOMMUNICATION NETWORKS;

EID: 47749125439     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-69389-5_66     Document Type: Conference Paper
Times cited : (17)

References (10)
  • 2
    • 35048820591 scopus 로고    scopus 로고
    • Boudec, J.Y.L., Sarafijanovic, S.: An artificial immune system approach to misbehavior detection in mobile ad hoc networks. In: Ijspeert, A.J., Murata, M., Wakamiya, N. (eds.) BioADIT 2004. LNCS, 3141, pp. 396-411. Springer, Heidelberg (2004)
    • Boudec, J.Y.L., Sarafijanovic, S.: An artificial immune system approach to misbehavior detection in mobile ad hoc networks. In: Ijspeert, A.J., Murata, M., Wakamiya, N. (eds.) BioADIT 2004. LNCS, vol. 3141, pp. 396-411. Springer, Heidelberg (2004)
  • 3
    • 47749091318 scopus 로고    scopus 로고
    • Anderson, J.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., Fort Washington, PA (1980)
    • Anderson, J.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., Fort Washington, PA (1980)
  • 4
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222-232 (1987)
    • (1987) IEEE Trans. Softw. Eng , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 5
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • Ilgun, K., Kemmerer, R., Porras, P.: State transition analysis: A rule-based intrusion detection approach. Software Engineering 21(3), 181-199 (1995)
    • (1995) Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 7
    • 85117735487 scopus 로고    scopus 로고
    • A general cooperative intrusion detection architecture for manets
    • IEEE Computer Society, Los Alamitos
    • Sterne, D., et al.: A general cooperative intrusion detection architecture for manets. In: IWIA 2005: Proc. of the Third IEEE Int. Workshop on Information Assurance (IWIA 2005), pp. 57-70. IEEE Computer Society, Los Alamitos (2005)
    • (2005) IWIA 2005: Proc. of the Third IEEE Int. Workshop on Information Assurance (IWIA , pp. 57-70
    • Sterne, D.1
  • 9
    • 25144468350 scopus 로고    scopus 로고
    • Algorithm of behavior evaluation in multiagent system
    • Sunderam, V.S, van Albada, G.D, Sloot, P.M.A, Dongarra, J, eds, ICCS, Springer, Heidelberg
    • Rojek, G., Cieciwa, R., Cetnarowicz, K.: Algorithm of behavior evaluation in multiagent system. In: Sunderam, V.S., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2005. LNCS, vol. 3516, pp. 711-718. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3516 , pp. 711-718
    • Rojek, G.1    Cieciwa, R.2    Cetnarowicz, K.3
  • 10
    • 0004148834 scopus 로고    scopus 로고
    • Bradshaw, J.M, ed, AAAI Press/The MIT Press
    • Bradshaw, J.M. (ed.): Software Agents. AAAI Press/The MIT Press (1997)
    • (1997) Software Agents


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.